Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2014.050607
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 5 Issue 6, 2014.
Abstract: Databases are an important and almost mandatory means for storing information for later use. Databases require effective security to protect the information stored within them. In particular access control measures are especially important for cloud databases, because they can be accessed from anywhere in the world at any time via the Internet. The internet has provided a plethora of advantages by increasing accessibility to various services, education, information and communication. The internet also presents challenges and disadvantages, which include securing services, information and communication. Naturally, the internet is being used for good but also to carry out malicious attacks on cloud databases. In this paper we discuss approaches and techniques to protect cloud databases, including security policies which can realized as security patterns.
Ingrid A. Buckley and Fan Wu, “Security Policies for Securing Cloud Databases” International Journal of Advanced Computer Science and Applications(IJACSA), 5(6), 2014. http://dx.doi.org/10.14569/IJACSA.2014.050607